Abstract

This article looks at the definition of cyber terrorism and terrorist use of the Internet. The article evaluates cyber terrorist threats facing countries such as the United States of America, the United Kingdom, India and South Africa. The article also examines measures introduced by the respective governments in these countries to counteract cyber terrorist threats. Finally, the article will propose a way forward to counteract such possible threats in the future.
 
 The face of terrorism is changing. The convergence of the physical and virtual worlds has resulted in the creation of a “new threat” called cyber terrorism. Cyber terrorism is one of the recognised cyber crimes. The absence of suitable legal frameworks to address cyber terrorism at national and regional levels, the lack of adequate safeguards, the lack of cyber security strategies and the pre-occupation of countries with internal factors have all contributed to the creation of an environment that can be easily infiltrated by cyber terrorists.
 
 The horrific events of 9/11 provided the impetus for many countries to introduce anti-terrorist legislation. The United States of America, United Kingdom, India and South Africa have introduced legislation to address the threat of cyber terrorism.

Highlights

  • Cyber space is regarded as the meeting place for criminal groups.[1]

  • 8 It is important to distinguish between cyber crime and cyber terrorism

  • The article looks at measures introduced in the United States of America, United Kingdom and India to address the threat posed by cyber terrorism

Read more

Summary

Introduction

Cyber space is regarded as the meeting place for criminal groups.[1]. Cyber space has recently emerged as the latest battleground in this digital age.[2]. South Africa has introduced a number of legislative measures to address the growing threat of cyber terrorism and terrorist financing such as the Prevention of Organised Crime Act 38 of 1999 (“POCA”), the Financial Intelligence Centre Act 38 of 2001 (“FICA”), the Electronic Communications and Transactions Act 25 of 2002 (“ECT), the Regulation of Interception of. The article looks at measures introduced in the United States of America, United Kingdom and India to address the threat posed by cyber terrorism. Countries need to ensure that a balance is maintained between the protection of human rights and the need for effective prosecution when enacting cyber terrorist legislation

Definition of cyber terrorism
Different uses of the Internet by terrorist groups
Cyber terrorism
Comparative perspective
United Kingdom
South Africa
The way forward for South Africa
F CASSIM 8 Recommendations and conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call